What is Free Encryption Software?

Encryption software allows companies to protect and secure data using cryptography to protect valuable files and sensitive data and enhance security. Compare and read user reviews of the best Free Encryption software currently available using the table below. This list is updated regularly.

  • 1
    QuantaStor

    QuantaStor

    OSNEXUS

    QuantaStor is a unified Software-Defined Storage platform designed to scale up and out to make storage management easy while reducing overall enterprise storage costs. With support for all major file, block, and object protocols including iSCSI/FC, NFS/SMB, and S3, QuantaStor storage grids may be configured to address the needs of complex workflows which span sites and datacenters. QuantaStor’s storage grid technology is a built-in federated management system which enables QuantaStor servers to be combined together to simplify management and automation via CLI and REST APIs. The layered architecture of QuantaStor provides solution engineers with unprecedented flexibility and application design options that maximizes workload performance and fault-tolerance for a wide range of storage workloads. QuantaStor includes end-to-end security coverage enabling multi-layer data protection “on the wire” and “at rest” for enterprise and cloud storage deployments.
    Starting Price: $/TB based on scale
    Partner badge
    View Software
    Visit Website
  • 2
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • Previous
  • You're on page 1
  • Next